Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
6879f9c04dea4729dc8d53fb8f01bfe2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6879f9c04dea4729dc8d53fb8f01bfe2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6879f9c04dea4729dc8d53fb8f01bfe2_JaffaCakes118.html
-
Size
201KB
-
MD5
6879f9c04dea4729dc8d53fb8f01bfe2
-
SHA1
4ac54355b12cb7f270e5f957552e33f1a9916804
-
SHA256
725cef742812614079705d98941ce2c2657c27eca8901407225966cb1e8d9ed4
-
SHA512
bd970bb3eed31c5de79242147b9aa4bd76c4741cb62df019aef03afebd3cc9d1427d71ac8b806c6c6f2b562d880e488a4c3679ad83ec1cfbb52181e5d415f31c
-
SSDEEP
1536:kauN04MMCAOleo4nKbKbgR6Oxd+hoiNpnGyTjLK2GvM:duLHj
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0794fb084acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C26C6FE1-1877-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f7b3fcd3aacb454aa41701ab00b5e7a400000000020000000000106600000001000020000000bc6547f4fd9ba83ea92db0d20ee7499014373d66c0f749c6cdfe9dd91c3f5f07000000000e8000000002000020000000c5aeb499980f404db7aa5ea170d0fff95bb0bfd420b0e8819474419a22eeb8932000000055ce3275630523580b5e815d0ab10b2e0426d595ebfce6b7b13e7d1af314069e400000002222cb59320df4b214a5b627ec00c556b6c7dbd67639d2663315b5bdc41765342f7ad8fc4f25e0561a39014de5d1dfbb314181af79b2ad4b5e7aa2a24d199bfe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422570685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1640 iexplore.exe 1640 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1640 wrote to memory of 2120 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 2120 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 2120 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 2120 1640 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6879f9c04dea4729dc8d53fb8f01bfe2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5eb8625ee6409873032fab21852cb3ac3
SHA136b01a88aff6869cd44fe30344ed20b88629b78d
SHA25680b36ba5db208841ade871b8a53afd444bfc15bbf7b462da1cf7b4c4cd24dd4c
SHA512bf3592bcd0d646414ad44da58c6587a28d4167d3ebc841a9769bfd9a8c4dbb2ad165deccc28fe95d311802e8639b64cb86d910964878a21b28d44a040300f71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2c763192de46401c553e7f3ac65109
SHA12b649f931fab685fa2b3f41ceadf5b1802c9765c
SHA2566f5a38e40c238f4f1b081f6a2af2d9f550f1373909bf086f9d640460dfde9506
SHA51275b19c4591ebb3f51b98f871680cac87f33c9d5f701c97289c7ee66b73d82b6c4e29c76b0e8cb5c41eb6e991aa690278f3cc180bdb8591d042efe9ffa6d59198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a88d9705c5fe97df4fa602bd7f4aca4
SHA15cfb27ddd655fb2004d1f7efb580f2e56cde0644
SHA256a406f60377ef00f756f065abd5787aaf6e53e3ffc23c33e3210ed8058c39a24f
SHA5125d270ab39b81c428caea8e7c10d75385dc62441ffa581a30881c33dcb3e6661d95673343ddfcae27a46af4039227a8395e9682aaf8e715a3730f0dbe4d5520f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583eba9c81cb4524158cfde6e43c68827
SHA1782b7a3e2ab13b163f413ab530f4c0830c992495
SHA256bced56db2958a58715096b70b691effe89cf71ef85c4b9f21cf946a2971050ec
SHA512844adae3fce245259e9b8076519fae48a57ed515742ffd815f928be72473a5734778f0ee234402e7745fc5ebc8b858e736f9a1892b3daf01f319f2596b75de38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665977652f8a6c880bbbc6556dc79546
SHA1d5b40447c27c64912e9be277fa1391f086ee0f49
SHA256e6267356cc5c6918a95246d1a8756cb7d3ee9e92008691c5df705a454936bbdb
SHA5126fb264195f55bf58a1119e90ad8d4ea3e7e0bf7134346c9cc5a78e7cc86e09e4f629d7fb6e373a9c60a5234f738f3237b8b0c0117eaec319e86fdb1bec1ec6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b5a79ceee1c5c86db5a5b82c32b0f4e
SHA193255bd8d17e86c4f1a92aa95fbb0225fb8d4c2f
SHA256462c4607d1609c196cc83635fea6c5549f963ee806f47cfcb1ba7826407515b3
SHA512b821a69eb09371583a210c7c2bd94b44993e177b4738d9edbaad5401e94ac38b5adf1fe4c11d86306ca3d280100b53a2466aeea732db98cbc034f50efd620988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e524a6114139641a17a0bcdb00817851
SHA1fae35ac0b974aaf1a6123693bbd2b3399e85d628
SHA256f65876296dc7298b3a4edb71bfe266702d0cc45cd6b9360f2e4937fe751bd35d
SHA512a6dbd008d1ea6253fba59f3128bec27a9e2f2c5a882d2626a7756ee5cfb30a98384c71cf5bf5177f4aacc7aef093bed77d8377e13ab37b803d2071f741370474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b9d4f8c15756fe1d57725bcd9acc6ed
SHA1b634b4161b98b2084b37b95cd9ecc07aff182272
SHA2566522f758d75facbc01a5c1860e247371b0933f167ae9fc22ee2563a0126f4202
SHA512c6904965ff13fdbfb34484a1a6f68bd9728565985710473901f23b696bbe01fa0f0466088539b017531fc72b27886fa29f7408b72a3504fbea055bef18246e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df9ed31ce0cf105554a22890c9f97a5
SHA162f54868e244f2e83f57ab22b22529888736f501
SHA256cd4404b79c6c95d866e5a8739056e745686863cc22c02bd940ba88798742003a
SHA512f5a55491599d32e8a8be6bf1c199ba289dbce6d2d13ee58d5e21ba43cc4ed6b6c46a5f92be4901a823becc24d642857bf7ffec659b382940bfa782fb4ef675fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d373c670daff5982df922a2d396ffee0
SHA13d0829d464255ff736d21ca928f85abec4cc2d5b
SHA256da33feffb6d4877dda81d279056d5b579466e14c234f29ea3b54076dbf428118
SHA5120ed414bcdf69d1eab4dc19252cb66f168f285d79d0001a9ccafb51d73712e062af216cbdfbdbd3e14467650dc21fb9afa6533157721ff62a67d507e75aa10dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8218c53652e76e6aa57b5576a4e2aa2
SHA17b0a39e7b9f3019899369467994d12703a9d2881
SHA256b56fef015cfdba233c9c4b5497d32ef08f41dfc2da51ef496eaa75ee2f12da8b
SHA512cd54a5a7aaba008df5b308338abce6dd0ae03adf4d2530dcd3d8cdec97d9d7eb553740627aef3998b56a30bb8f7bf97cd583656420f3dd4b20eded76db285d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541442b01d2f1eaabcde0beca3c04be59
SHA15ab42ce426e4d17c0b6e98744423bebd669eb17b
SHA256272b970e2df5509f5a3396978f815eb3c59894d2bd5c973b7b91cd239c7cc2a7
SHA512d82aec9241dbcd86709d4d56886afc7f3652f37dc704782c984e11181f202441459ec022797ded208a7dfdcfe5390e2b396d243b44fb965de37bd1d779fb05d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779af8c2a4f1fd905192ad6fd1107509
SHA1ede019d56f9d6644d5d525fd560f626acc11a874
SHA256ad408dde11530fc7e2683572231523ee4126935a6585d56c63c1894958861600
SHA512a45c3a653629bbfeac79a1e744cc001816d4b43808b57c3c7efbb7353d9a1e1e2a1289e18fc28033f359c5296f0c6ca9d26411f5b59bc61128fe664c219f6997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53b81224ecb0db8e753c11095b1f3c13c
SHA18f74721008cf3e112ac8b69d901e32a370110f9b
SHA256440cf7f00dd2f9083aeb11d7da4a245214ee3a20b41817f94155a41afac8a9f7
SHA51220db199366ac44291e98ed0ffc272239edf247d25b02191c2b8eb2a41aa071fcb60924eb030a0ae1f8586a9f8edf500f09d853639b22bac0d9b1b3550f14b101
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a